必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.170.139.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.170.139.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:56:23 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 71.139.170.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.139.170.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.211.216.173 attack
Oct 13 11:40:41 tdfoods sshd\[28343\]: Invalid user Qwerty\#123 from 104.211.216.173
Oct 13 11:40:41 tdfoods sshd\[28343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
Oct 13 11:40:44 tdfoods sshd\[28343\]: Failed password for invalid user Qwerty\#123 from 104.211.216.173 port 37950 ssh2
Oct 13 11:45:33 tdfoods sshd\[28702\]: Invalid user Rent@123 from 104.211.216.173
Oct 13 11:45:33 tdfoods sshd\[28702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
2019-10-14 05:54:24
167.99.219.207 attackspam
Feb 20 05:50:11 dillonfme sshd\[22380\]: Invalid user luky from 167.99.219.207 port 43940
Feb 20 05:50:12 dillonfme sshd\[22380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.219.207
Feb 20 05:50:14 dillonfme sshd\[22380\]: Failed password for invalid user luky from 167.99.219.207 port 43940 ssh2
Feb 20 05:55:37 dillonfme sshd\[22596\]: Invalid user psql from 167.99.219.207 port 35582
Feb 20 05:55:37 dillonfme sshd\[22596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.219.207
...
2019-10-14 06:07:26
222.186.175.161 attack
Oct 13 22:01:36 sshgateway sshd\[19597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Oct 13 22:01:38 sshgateway sshd\[19597\]: Failed password for root from 222.186.175.161 port 48654 ssh2
Oct 13 22:01:56 sshgateway sshd\[19597\]: error: maximum authentication attempts exceeded for root from 222.186.175.161 port 48654 ssh2 \[preauth\]
2019-10-14 06:25:31
211.147.216.19 attackspam
Oct 13 22:52:35 mail sshd\[29654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.216.19  user=root
Oct 13 22:52:37 mail sshd\[29654\]: Failed password for root from 211.147.216.19 port 54272 ssh2
Oct 13 22:57:24 mail sshd\[29692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.216.19  user=root
...
2019-10-14 05:52:31
69.94.157.91 attackspam
$f2bV_matches
2019-10-14 06:17:22
142.93.33.62 attackspam
2019-10-13T22:00:45.901895shield sshd\[30414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.33.62  user=root
2019-10-13T22:00:47.954555shield sshd\[30414\]: Failed password for root from 142.93.33.62 port 58256 ssh2
2019-10-13T22:04:22.536469shield sshd\[31341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.33.62  user=root
2019-10-13T22:04:24.044595shield sshd\[31341\]: Failed password for root from 142.93.33.62 port 41006 ssh2
2019-10-13T22:07:58.775722shield sshd\[942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.33.62  user=root
2019-10-14 06:14:10
167.99.2.191 attack
Feb 10 03:07:21 dillonfme sshd\[14404\]: Invalid user kobis from 167.99.2.191 port 58652
Feb 10 03:07:21 dillonfme sshd\[14404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.2.191
Feb 10 03:07:22 dillonfme sshd\[14404\]: Failed password for invalid user kobis from 167.99.2.191 port 58652 ssh2
Feb 10 03:12:04 dillonfme sshd\[14568\]: Invalid user admin from 167.99.2.191 port 49748
Feb 10 03:12:04 dillonfme sshd\[14568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.2.191
...
2019-10-14 06:16:22
88.157.176.94 attack
postfix
2019-10-14 06:28:25
83.61.140.57 attackbotsspam
scan z
2019-10-14 06:30:23
139.59.41.154 attackspam
Oct 13 23:16:02 MK-Soft-VM7 sshd[6740]: Failed password for root from 139.59.41.154 port 38578 ssh2
...
2019-10-14 06:06:31
115.159.185.71 attackbotsspam
Oct 13 23:27:48 meumeu sshd[31297]: Failed password for root from 115.159.185.71 port 35142 ssh2
Oct 13 23:32:25 meumeu sshd[32146]: Failed password for root from 115.159.185.71 port 45736 ssh2
...
2019-10-14 05:57:35
165.22.228.10 attackspambots
Oct 14 01:08:07 www sshd\[50486\]: Failed password for root from 165.22.228.10 port 42216 ssh2Oct 14 01:12:10 www sshd\[50553\]: Failed password for root from 165.22.228.10 port 53880 ssh2Oct 14 01:16:11 www sshd\[50578\]: Failed password for root from 165.22.228.10 port 37312 ssh2
...
2019-10-14 06:25:18
167.99.210.225 attackspam
Feb 19 18:09:01 dillonfme sshd\[27114\]: Invalid user timemachine from 167.99.210.225 port 35698
Feb 19 18:09:01 dillonfme sshd\[27114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.210.225
Feb 19 18:09:03 dillonfme sshd\[27114\]: Failed password for invalid user timemachine from 167.99.210.225 port 35698 ssh2
Feb 19 18:14:29 dillonfme sshd\[27257\]: Invalid user ftpadmin from 167.99.210.225 port 55086
Feb 19 18:14:29 dillonfme sshd\[27257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.210.225
...
2019-10-14 06:08:47
120.157.39.184 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/120.157.39.184/ 
 AU - 1H : (34)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN1221 
 
 IP : 120.157.39.184 
 
 CIDR : 120.156.0.0/15 
 
 PREFIX COUNT : 478 
 
 UNIQUE IP COUNT : 9948416 
 
 
 WYKRYTE ATAKI Z ASN1221 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 3 
 24H - 3 
 
 DateTime : 2019-10-13 22:14:58 
 
 INFO : Port SERVER 80 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-14 05:50:21
157.230.27.47 attack
Oct 13 12:03:32 sachi sshd\[18618\]: Invalid user qwerty12345 from 157.230.27.47
Oct 13 12:03:32 sachi sshd\[18618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.27.47
Oct 13 12:03:34 sachi sshd\[18618\]: Failed password for invalid user qwerty12345 from 157.230.27.47 port 37614 ssh2
Oct 13 12:07:46 sachi sshd\[18966\]: Invalid user Bizz@2017 from 157.230.27.47
Oct 13 12:07:46 sachi sshd\[18966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.27.47
2019-10-14 06:13:03

最近上报的IP列表

184.73.106.223 240.104.165.139 231.16.153.51 225.25.152.246
171.29.136.197 182.164.34.126 103.41.59.32 230.116.44.92
131.87.70.245 128.26.111.158 130.122.236.88 153.30.155.129
226.196.155.161 12.56.173.35 193.168.67.76 38.224.143.233
135.83.115.64 93.252.171.109 62.168.64.226 10.46.140.243